SlideShare a Scribd company logo
1 of 9
Download to read offline
THE CLOUD
in 2014
Predictions from Greylock Partners
and its Portfolio Companies
1.  Cloud and mobile security risks will
frustrate CIOs in 2014
As enterprises continue their march towards mobile
cloud computing, data security will become a top CIO
issue in 2014. Many organizations will attempt to solve
these problems with poorly suited tools, such as legacy
security appliances with bolt-on cloud and mobile
updates. Many of those same organizations will
suffer through major penetrations and data
breaches as a result. !
"
Organizations everywhere are migrating their front-ends
to mobile (smart phones, tablets, laptops), and their
back-ends to cloud infrastructures. As these trends
accelerate, organizations will continue to lose control
over data. Confidential data, intellectual property, and
customer information will all be more exposed to risk.
These types of data were previously classified and
tracked, but are rapidly becoming unmanageable. IT is
losing control. Because of that, data security will be a
Asheem Chandna
headline-grabbing topic throughout 2014, but those
Partner
headlines will be negative more often than not."
2.  IT stops blocking cloud services for
no good reason

Rajiv Gupta
Founder and CEO

There will be big change in 2014 on how IT copes with cloud
risks. The status quo is based on outdated arguments and
limited visibility. Today, IT generally blocks what it knows
(Facebook, YouTube, ESPN.com). Many of these sites are
blocked in order to prioritize productivity (and often to
conserve bandwidth). And what IT does not know today
generally gets through, which is often risky."
"
This approach is pointless at best, since it’s so easy to find
workarounds, and counterproductive at worst, since IT often
blocks services that will boost productivity. According to our
2013 Cloud Adoption & Risk Report, which compiled data
from more than 3 million users across more than 100
companies in various industries, IT still blocks what it
knows, not necessarily what puts organizations at risk.!
 "
In 2014, IT will get the visibility needed to feel comfortable
loosening the reigns, helping employees evaluate and
understand the risk of these services, rather than simply
blocking them. "
3.  Incumbents go on cloud buying sprees
to reclaim lost market share
Those who doubt that cloud computing is the future are
on the lunatic fringe, yet there are plenty of lunatics out
there. The cloud continues its march throughout
enterprises in nearly every industry -- a reality that
incumbents can no longer ignore or deny. Microsoft
continues to push Office 365, even if that strategy risks
eroding Office revenues, and even long-time cloud
skeptic Larry Ellison is on board, with the cloud
featured prominently at Oracle OpenWorld 2013.

"
Industry incumbents such as Oracle and SAP will
accelerate acquisitions of innovative cloud
software companies to buy their way into the
future. In 2014, IT decision makers must be more
vigilant than ever about choosing vendors that have
long-term viability — or risk getting locked into an
incumbent’s stack all over again. "
Frederic Kerrest
Co-Founder and COO
4.  Enterprise cloud apps will become
mainstream, sparking the rise of niche apps

In 2014, expect to see increased cloud adoption
in nearly every industry. Combined with the
economics of the cloud model that make it
cheaper to develop and spread applications on a
massive scale, this trend will ultimately result in
an exponential increase in the number of
enterprise cloud applications and services. "
!
What’s more, 2014 will be the year that niche,
industry-specific cloud applications and
services will take off. These applications simply
weren’t economical in the past, but 2013 proved
that’s no longer true. Veeva Systems experienced
one of the most successful IPOs of 2013, with a
reported $4.4 billion valuation. 2014 will be the
year that successful (and profitable) niche cloud
companies become the norm. "
Frederic Kerrest
Co-Founder and COO
5.  IaaS and PaaS are the final two nails
in the coffin of the traditional firewall
The traditional firewall isn’t dead, and probably won’t be for a
while, but it’s on life support. In 2014, IT will more actively
phase out legacy perimeter security tools. Two new cloud
technologies, IaaS and PaaS, will be the final nails in the
traditional firewall’s coffin. "
"
IaaS and PaaS are both mainly being used by small startups,
while large enterprises have only tested them for new
projects and front-end applications without a significant data
footprint. In 2014 we will see the beginning of heavy
backend data systems/applications moving into the
cloud. This will be a significant shift, showing that enterprises
are now comfortable enough to have their core (their blood)
move outside the walls of their corporation. Not all industries
will do that, e.g. finance and health will probably not make the
switch in 2014, but other industries will in 2014, such as
retail, telecommunications, CPG, and automotive. "
"
However, as companies make this shift, they will need to
rethink their security in order to protect data rather than
borders. !

Amr Awadallah
CTO
6.  Revenge of the CIO - CIO’s will
transition from CI-No’s to tech enablers

Rajiv Gupta
Founder and CEO

As IT departments become more strategic, the CIO’s
role will change drastically too. CIOs are tired of being
“CI-No’s.” It’s not a fun job. Fortunately, they no longer
have to fill that role. As IT pros evolve into internal tech
consultants who identify, evaluate, and oversee
technologies (and not necessarily the ones who have
to develop, deliver, or operate these technologies),
CIOs will be tasked with figuring out how new
technologies deliver competitive advantages."
"
CIOs will look at cloud, mobile, social media, and
whatever other new technology comes along to
discern how these cloud services will benefit the
business, operationally and strategically. This
means the background of CIOs will change as well.
Organizations will value pure IT backgrounds less and
less, instead prioritizing business and operational
experience. "
6.  CIOs who aren’t comfortable with cloud,
mobile, and social will be on the hot seat
By the end of 2014, CIOs who don’t understand the
strategic importance of social, mobile, analytics and
cloud will be considered old school and less relevant
to the organization. CIOs who “just say no” and
fail to adapt will face criticism from everyone
from board members who can’t live without
access to corporate data on their personal
tablets to developers who demand access to
services like AWS.!
"
Moreover, in 2014 CMOs will continue to infringe
on areas of responsibility that used to belong
solely to the CIO. Those CIOs who continue to
block cloud services that deliver business value will
place their organizations at a competitive
disadvantage, and once the rest of the C-suite
wakes up to that fact, it will be the CMO, not the CIO,
driving the future of technology within those slow-toadapt organizations. "

Rajiv Gupta
Founder and CEO
More Slideshares You May Like

Brought to you by "

More Related Content

Viewers also liked

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaSkyhigh Networks
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaAsheem Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - FranticMiika Puputti
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve JobsHubSpot
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Manufacturing Saas
Manufacturing SaasManufacturing Saas
Manufacturing SaasAllen Miller
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSkyhigh Networks
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 

Viewers also liked (10)

The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
Internet of Things - October 2013 - Chandna
Internet of Things - October 2013 - ChandnaInternet of Things - October 2013 - Chandna
Internet of Things - October 2013 - Chandna
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Cloud Security Alliance - Guidance
Cloud Security Alliance - GuidanceCloud Security Alliance - Guidance
Cloud Security Alliance - Guidance
 
Internet of things - Frantic
Internet of things - FranticInternet of things - Frantic
Internet of things - Frantic
 
16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs16 Inspirational Quotes From the Late, Great Steve Jobs
16 Inspirational Quotes From the Late, Great Steve Jobs
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Manufacturing Saas
Manufacturing SaasManufacturing Saas
Manufacturing Saas
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 

Recently uploaded

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Recently uploaded (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

The Cloud in 2014 - Predictions from Greylock Partners

  • 1. THE CLOUD in 2014 Predictions from Greylock Partners and its Portfolio Companies
  • 2. 1.  Cloud and mobile security risks will frustrate CIOs in 2014 As enterprises continue their march towards mobile cloud computing, data security will become a top CIO issue in 2014. Many organizations will attempt to solve these problems with poorly suited tools, such as legacy security appliances with bolt-on cloud and mobile updates. Many of those same organizations will suffer through major penetrations and data breaches as a result. ! " Organizations everywhere are migrating their front-ends to mobile (smart phones, tablets, laptops), and their back-ends to cloud infrastructures. As these trends accelerate, organizations will continue to lose control over data. Confidential data, intellectual property, and customer information will all be more exposed to risk. These types of data were previously classified and tracked, but are rapidly becoming unmanageable. IT is losing control. Because of that, data security will be a Asheem Chandna headline-grabbing topic throughout 2014, but those Partner headlines will be negative more often than not."
  • 3. 2.  IT stops blocking cloud services for no good reason Rajiv Gupta Founder and CEO There will be big change in 2014 on how IT copes with cloud risks. The status quo is based on outdated arguments and limited visibility. Today, IT generally blocks what it knows (Facebook, YouTube, ESPN.com). Many of these sites are blocked in order to prioritize productivity (and often to conserve bandwidth). And what IT does not know today generally gets through, which is often risky." " This approach is pointless at best, since it’s so easy to find workarounds, and counterproductive at worst, since IT often blocks services that will boost productivity. According to our 2013 Cloud Adoption & Risk Report, which compiled data from more than 3 million users across more than 100 companies in various industries, IT still blocks what it knows, not necessarily what puts organizations at risk.!  " In 2014, IT will get the visibility needed to feel comfortable loosening the reigns, helping employees evaluate and understand the risk of these services, rather than simply blocking them. "
  • 4. 3.  Incumbents go on cloud buying sprees to reclaim lost market share Those who doubt that cloud computing is the future are on the lunatic fringe, yet there are plenty of lunatics out there. The cloud continues its march throughout enterprises in nearly every industry -- a reality that incumbents can no longer ignore or deny. Microsoft continues to push Office 365, even if that strategy risks eroding Office revenues, and even long-time cloud skeptic Larry Ellison is on board, with the cloud featured prominently at Oracle OpenWorld 2013.
 " Industry incumbents such as Oracle and SAP will accelerate acquisitions of innovative cloud software companies to buy their way into the future. In 2014, IT decision makers must be more vigilant than ever about choosing vendors that have long-term viability — or risk getting locked into an incumbent’s stack all over again. " Frederic Kerrest Co-Founder and COO
  • 5. 4.  Enterprise cloud apps will become mainstream, sparking the rise of niche apps In 2014, expect to see increased cloud adoption in nearly every industry. Combined with the economics of the cloud model that make it cheaper to develop and spread applications on a massive scale, this trend will ultimately result in an exponential increase in the number of enterprise cloud applications and services. " ! What’s more, 2014 will be the year that niche, industry-specific cloud applications and services will take off. These applications simply weren’t economical in the past, but 2013 proved that’s no longer true. Veeva Systems experienced one of the most successful IPOs of 2013, with a reported $4.4 billion valuation. 2014 will be the year that successful (and profitable) niche cloud companies become the norm. " Frederic Kerrest Co-Founder and COO
  • 6. 5.  IaaS and PaaS are the final two nails in the coffin of the traditional firewall The traditional firewall isn’t dead, and probably won’t be for a while, but it’s on life support. In 2014, IT will more actively phase out legacy perimeter security tools. Two new cloud technologies, IaaS and PaaS, will be the final nails in the traditional firewall’s coffin. " " IaaS and PaaS are both mainly being used by small startups, while large enterprises have only tested them for new projects and front-end applications without a significant data footprint. In 2014 we will see the beginning of heavy backend data systems/applications moving into the cloud. This will be a significant shift, showing that enterprises are now comfortable enough to have their core (their blood) move outside the walls of their corporation. Not all industries will do that, e.g. finance and health will probably not make the switch in 2014, but other industries will in 2014, such as retail, telecommunications, CPG, and automotive. " " However, as companies make this shift, they will need to rethink their security in order to protect data rather than borders. ! Amr Awadallah CTO
  • 7. 6.  Revenge of the CIO - CIO’s will transition from CI-No’s to tech enablers Rajiv Gupta Founder and CEO As IT departments become more strategic, the CIO’s role will change drastically too. CIOs are tired of being “CI-No’s.” It’s not a fun job. Fortunately, they no longer have to fill that role. As IT pros evolve into internal tech consultants who identify, evaluate, and oversee technologies (and not necessarily the ones who have to develop, deliver, or operate these technologies), CIOs will be tasked with figuring out how new technologies deliver competitive advantages." " CIOs will look at cloud, mobile, social media, and whatever other new technology comes along to discern how these cloud services will benefit the business, operationally and strategically. This means the background of CIOs will change as well. Organizations will value pure IT backgrounds less and less, instead prioritizing business and operational experience. "
  • 8. 6.  CIOs who aren’t comfortable with cloud, mobile, and social will be on the hot seat By the end of 2014, CIOs who don’t understand the strategic importance of social, mobile, analytics and cloud will be considered old school and less relevant to the organization. CIOs who “just say no” and fail to adapt will face criticism from everyone from board members who can’t live without access to corporate data on their personal tablets to developers who demand access to services like AWS.! " Moreover, in 2014 CMOs will continue to infringe on areas of responsibility that used to belong solely to the CIO. Those CIOs who continue to block cloud services that deliver business value will place their organizations at a competitive disadvantage, and once the rest of the C-suite wakes up to that fact, it will be the CMO, not the CIO, driving the future of technology within those slow-toadapt organizations. " Rajiv Gupta Founder and CEO
  • 9. More Slideshares You May Like Brought to you by "